ves-io-schema-secret_policy-API-Create

Examples of creating secret_policy

Usecase:

Create secret-policy-1

Request using vesctl:

vesctl configuration create secret_policy -i secret_policy.yaml

where file secret_policy.yaml has following contents (secret_policy.CreateRequest):

RequestJSON:

          {
    "metadata": {
        "name": "secret-policy-1",
        "namespace": "documentation"
    },
    "spec": {
        "decrypt_cache_timeout": "604800s",
        "legacy_rule_list": {
            "rules": [
                {
                    "kind": "secret_policy_rule",
                    "name": "secret-policy-rule-1"
                },
                {
                    "kind": "secret_policy_rule",
                    "name": "secret-policy-rule-2"
                }
            ]
        }
    }
}
        

vesctl yaml response:

ResponseJSON:

          {
    "metadata": {
        "name": "secret-policy-1",
        "namespace": "documentation",
        "labels": {},
        "annotations": {},
        "description": "",
        "disable": false
    },
    "system_metadata": {
        "uid": "0357d61e-b9ee-44a0-8077-efcf19554038",
        "creation_timestamp": "2024-03-21T14:06:55.692369Z",
        "deletion_timestamp": null,
        "modification_timestamp": null,
        "initializers": null,
        "finalizers": [],
        "tenant": "acmecorp",
        "creator_class": "examplesvc",
        "creator_id": "examplesvc",
        "object_index": 0,
        "owner_view": null,
        "labels": {}
    },
    "spec": {
        "algo": "FIRST_MATCH",
        "rules": [],
        "allow_f5xc": false,
        "decrypt_cache_timeout": "604800s",
        "marked_for_delete": false,
        "deletion_time": null,
        "legacy_rule_list": {
            "rules": [
                {
                    "kind": "secret_policy_rule",
                    "uid": "ffffffff-ffff-ffff-ffff-ffffffffffff",
                    "tenant": "acmecorp",
                    "namespace": "documentation",
                    "name": "secret-policy-rule-1"
                },
                {
                    "kind": "secret_policy_rule",
                    "uid": "ffffffff-ffff-ffff-ffff-ffffffffffff",
                    "tenant": "acmecorp",
                    "namespace": "documentation",
                    "name": "secret-policy-rule-2"
                }
            ]
        }
    }
}
        

Request using curl:

          curl -X 'POST' -d '{"metadata":{"name":"secret-policy-1","namespace":"documentation"},"spec":{"decrypt_cache_timeout":"604800s","legacy_rule_list":{"rules":[{"kind":"secret_policy_rule","name":"secret-policy-rule-1"},{"kind":"secret_policy_rule","name":"secret-policy-rule-2"}]}}}' -H 'Content-Type: application/json' -H 'X-Volterra-Useragent: v1/pgm=_var_folders_2__8qnt6fwd5dvglr1xqq6l8b7w0000gp_T_go-build3109416560_b001_apidocs.test/host=C02FN35BMD6R/svc=S:examplesvc/site=mytestce01' 'https://acmecorp.console.ves.volterra.io/api/secret_management/namespaces/documentation/secret_policys'
        

curl response:

          HTTP/1.1 200 OK
Content-Length: 1310
Content-Type: application/json
Date: Thu, 21 Mar 2024 14:06:55 GMT
Vary: Accept-Encoding

{
  "metadata": {
    "name": "secret-policy-1",
    "namespace": "documentation",
    "labels": {
    },
    "annotations": {
    },
    "description": "",
    "disable": false
  },
  "system_metadata": {
    "uid": "0357d61e-b9ee-44a0-8077-efcf19554038",
    "creation_timestamp": "2024-03-21T14:06:55.692369Z",
    "deletion_timestamp": null,
    "modification_timestamp": null,
    "initializers": null,
    "finalizers": [
    ],
    "tenant": "acmecorp",
    "creator_class": "examplesvc",
    "creator_id": "examplesvc",
    "object_index": 0,
    "owner_view": null,
    "labels": {
    }
  },
  "spec": {
    "algo": "FIRST_MATCH",
    "rules": [
    ],
    "allow_f5xc": false,
    "decrypt_cache_timeout": "604800s",
    "marked_for_delete": false,
    "deletion_time": null,
    "legacy_rule_list": {
      "rules": [
        {
          "kind": "secret_policy_rule",
          "uid": "ffffffff-ffff-ffff-ffff-ffffffffffff",
          "tenant": "acmecorp",
          "namespace": "documentation",
          "name": "secret-policy-rule-1"
        },
        {
          "kind": "secret_policy_rule",
          "uid": "ffffffff-ffff-ffff-ffff-ffffffffffff",
          "tenant": "acmecorp",
          "namespace": "documentation",
          "name": "secret-policy-rule-2"
        }
      ]
    }
  }
}